would request same documents. In this case a
unicast message needs to be sent to all requesters.
This however would greatly decrease the
performance due to overhead of repeatedly sending
the same message. As a solution to this problem we
suggest maintaining a list of adjacent nodes at all
times. If a simple majority of hosts request same
documents we send a broadcast message to all
instead of individual unicast messages.
As with the case of ad Hoc networks a new or
returning node can enter the range of n1 and start
communication. If a node n
k
enters the moment n
1
sent the broadcast, n
k
would receive a copy of the
document, which can be saved in the repository of
n
k
. Our experimentation shows an interesting effect
on performance of this phenomenon, nonetheless we
show that broadcasting a document requested by
multiple hosts is in fact better than sending multiple
unicast messages to each requesting host.
4 SIMULATION AND ANALYSIS
The proposed protocol in section 3 has been
implemented in Java and interfaced with MADHOC
(Hogie) simulation tool. We run a number of 15,000
iteration / seconds, simulations to study the various
conditions of the protocol based on many
parameters. These parameters are discussed as
follows.
We assume that each user is equipped with a
laptop device or a Wi-Fi enabled PDA device. Each
device has a Omni directional transmission range of
100m. There are 100 users in a 1000m x 1000m
environment. This environment consists of various
spots with a random size no larger than 100m x
100m. These spots can be considered as shops or
other buildings. The transmission range is reduced to
40 m when inside a spot due to various factors. The
users move between spots using a random waypoint
model, where a user may pause for a random time,
decide a target destination spot then start moving
towards that spot. For the mobility model, we
assume the user moves with a speed of 3 m/s when
not in a spot and 2 m/s when inside the spot area;
amount of mobility within the spot is set to 60% and
outside is 40%. User may pause for up to 2 minutes
to look for a destination.
In our experiments we define 32 different
interest profiles. Each user in the MSN would have
to select four distinct interests. We match user’s
interests for a possibility of communication. Each
user has various documents of different types
including images, videos and audios. We assume
that no document is larger than 512Kb. Each user
can also create a document every 10 seconds in the
simulation. Since we assumed that the Users
Repository is limited therefore we place a bound on
the size of the repository and leave it to 10MB
maximum in the host. Each host broadcasts an
announce message every 15 seconds, we assume this
delay because at pedestrian speeds 15 seconds is
generally considered as an adequate time for
MANETs (Haillot, 2008). Each node announces four
interests in its profile, any neighbor with at least one
of the similar interests, sends invite to share
documents. At a certain time if the repository is
filled and no further documents can be stored, the
node in question would remove the least recently
used document to make space for a newer document.
To evaluate the proposed protocol in section 3
we compare its performance with a modified version
of the same protocol. In the modified version of the
protocol, every host requests for every possible
document from a neighbor with no limits to numbers
of documents being shared, thus being a greedy host.
The consequence of the greedy host protocol would
be that each host requests and stores documents it
may not be interested in, but these documents can be
forwarded later to other interested hosts.
In Figure 3, a comparison is shown between the
numbers of documents received by both protocols.
On average it can be seen that the proposed protocol
has received more documents as compared to the
greedy version. The number of documents created is
clearly more than the documents received by either
protocol. It can be seen that our protocol receives
documents at a rate almost similar to the rate of
document creation. However the greedy protocol is
less efficient in this regard. In the beginning of the
simulation the rate for documents received by either
protocol is much lower, the reason could be that it
takes time for documents to disseminate in the
network.
Another aspect to be noted is that the number of
documents received by the greedy protocol is higher
than the proposed protocol in the beginning of the
simulation, i.e upto 3000 sec in this scenario; Since
greedy protocol enthusiastically searches and stores
more documents regardless of relativity to the
interests, for that reason it is able to obtain more
documents. However since there is a limited space
available in each repository the space quickly fills
up in the beginning of the simulation. When there is
no space to store a newer document, the node looks
for the least recently used document and removes it
from the repository. This technique for making more
space obviously has a disadvantage of removing
some documents before these are even shared on the
network.
WINSYS 2009 - International Conference on Wireless Information Networks and Systems
60